Abstract:
Verifying the integrity of data to detect modification requires audit material of the original state of the data. Hash digests, Message Authentication Codes, or Digital S...Show MoreMetadata
Abstract:
Verifying the integrity of data to detect modification requires audit material of the original state of the data. Hash digests, Message Authentication Codes, or Digital Signatures are used as audit material while transmitting messages. However, when an Industrial Internet of Things gateway is present, the end-to-end security may need to be updated before forwarding. Whereby the integrity assurance relies on the trustfulness of the gateway. Given the risk of a compromised gateway the chain of trust is invariably broken. In this work, we explore alternatives to the audit data retrieval regimen of the Gateway Integrity Checking Protocol. We present three regimens and simulate their effects on a wireless network, measuring network lifetime expectation, total audit material generated, and the resulting detection rate of gateway misbehavior. We found that the regimens obtained an expected lifetime between 35.5 and 37.7 days while maintaining a similar detection rate.
Date of Conference: 27-29 April 2022
Date Added to IEEE Xplore: 26 May 2022
ISBN Information: